5
CVSSv2

CVE-2006-4965

Published: 25/09/2006 Updated: 17/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Apple QuickTime 7.1.3 Player and Plug-In allows remote malicious users to execute arbitrary JavaScript code and possibly conduct other attacks via a QuickTime Media Link (QTL) file with an embed XML element and a qtnext parameter that identifies resources outside of the original domain. NOTE: as of 20070912, this issue has been demonstrated by using instances of Components.interfaces.nsILocalFile and Components.interfaces.nsIProcess to execute arbitrary local files within Firefox and possibly Internet Explorer.

Vulnerable Product Search on Vulmon Subscribe to Product

apple quicktime 7.1.3

Vendor Advisories

Mozilla Foundation Security Advisory 2007-28 Code execution via QuickTime Media-link files Announced September 18, 2007 Reporter Petko D Petkov Impact Critical Products Firefox Fixed in ...

Exploits

source: wwwsecurityfocuscom/bid/20138/info Apple QuickTime plug-in is prone to an arbitrary-script-execution weakness when executing QuickTime Media Link files (qtl) An attacker can exploit this issue to execute arbitrary script code in the context of the affected application and load local content in a user's browser Although this we ...